Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 18:34

General

  • Target

    ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe

  • Size

    193KB

  • MD5

    e05eeee6d2bdf27d5dc83910ac7ca93b

  • SHA1

    c1985c15c8a4f84928e7832041c86b6d089c14fc

  • SHA256

    ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790

  • SHA512

    c152327a1e9dff584b7a2ff0fae2a5ed6444c69ada6a6a6b862e62103c36c09b8647f84806f97fc3cfa59bd470a8c0d209df95de02891d11241bde826e181afc

  • SSDEEP

    3072:OzA2AJKoClrGvNPuCGYR69X3wKvzNVL58ACjOJBfgPV+Muce:Ogs3YR65nVTtyPVBe

Malware Config

Signatures

  • CryptOne packer 7 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe
    "C:\Users\Admin\AppData\Local\Temp\ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\SysWOW64\notepad.exe"
        3⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
    • C:\Windows\SysWOW64\calc.exe
      "C:\Windows\SysWOW64\calc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
    • C:\Users\Admin\AppData\Local\Temp\ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe
      "C:\Users\Admin\AppData\Local\Temp\ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:908

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/860-100-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-122-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-58-0x0000000000000000-mapping.dmp
  • memory/860-92-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/860-97-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-126-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-112-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-55-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/860-65-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/860-106-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/860-332-0x0000000000230000-0x000000000027E000-memory.dmp
    Filesize

    312KB

  • memory/908-113-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-88-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-89-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-75-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-76-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-78-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-80-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-82-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-84-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/908-85-0x0000000000410910-mapping.dmp
  • memory/1240-73-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1240-69-0x0000000000000000-mapping.dmp
  • memory/1240-90-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1240-74-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1240-118-0x0000000000270000-0x00000000002BE000-memory.dmp
    Filesize

    312KB

  • memory/1240-72-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1240-71-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1240-334-0x0000000000270000-0x00000000002BE000-memory.dmp
    Filesize

    312KB

  • memory/1240-109-0x0000000000270000-0x00000000002BE000-memory.dmp
    Filesize

    312KB

  • memory/1240-138-0x0000000000270000-0x00000000002BE000-memory.dmp
    Filesize

    312KB

  • memory/1240-127-0x0000000000270000-0x00000000002BE000-memory.dmp
    Filesize

    312KB

  • memory/1428-63-0x00000000002C0000-0x00000000002D3000-memory.dmp
    Filesize

    76KB

  • memory/1428-54-0x0000000075071000-0x0000000075073000-memory.dmp
    Filesize

    8KB

  • memory/1428-91-0x0000000000400000-0x0000000004CC8000-memory.dmp
    Filesize

    72.8MB

  • memory/1428-64-0x0000000000400000-0x0000000004CC8000-memory.dmp
    Filesize

    72.8MB

  • memory/1632-66-0x0000000000080000-0x0000000000082000-memory.dmp
    Filesize

    8KB

  • memory/1632-132-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-128-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-115-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-123-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-108-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-60-0x0000000000000000-mapping.dmp
  • memory/1632-119-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-57-0x0000000000080000-0x0000000000082000-memory.dmp
    Filesize

    8KB

  • memory/1632-333-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-102-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1632-335-0x00000000001D8000-0x00000000001DA000-memory.dmp
    Filesize

    8KB